TRANSATLANTIC CYBER SECURITY SUMMIT



Similar documents
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Security Intelligence

WRITTEN TESTIMONY OF

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Microsoft s cybersecurity commitment

Lessons from Defending Cyberspace

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

The Next Generation Security Operations Center

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Seminar Conduct and Protocol Nicholas Witchell, for Payments UK. Welcome Maurice Cleaves, Payments UK

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

THE HUMAN FACTOR AT THE CORE OF FEDERAL CYBERSECURITY

Cybersecurity on a Global Scale

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

Defending Against Cyber Attacks with SessionLevel Network Security

Cybersecurity Delivering Confidence in the Cyber Domain

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

DHS. CMSI Webinar Series

Advanced Threat Protection with Dell SecureWorks Security Services

Overcoming Five Critical Cybersecurity Gaps

Middle Class Economics: Cybersecurity Updated August 7, 2015

CYBER SECURITY THREAT REPORT Q1

How To Write A National Cybersecurity Act

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

TUSKEGEE CYBER SECURITY PATH FORWARD

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Cyber Security: Designing and Maintaining Resilience

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

S. ll IN THE SENATE OF THE UNITED STATES

Oil & Gas Cybersecurity

Partnership for Cyber Resilience

U. S. Attorney Office Northern District of Texas March 2013

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

CyberSecurity Solutions. Delivering

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World

CYBERSECURITY. PROGRAMME 14 April Lunch / Delegates Registration

THE WORLD IS MOVING FAST, SECURITY FASTER.

The Path Ahead for Security Leaders

Seamus Reilly Director EY Information Security Cyber Security

Actions and Recommendations (A/R) Summary

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Cyber intelligence exchange in business environment : a battle for trust and data

Re-Imagining the Cyber Warrior of the Future

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Combating a new generation of cybercriminal with in-depth security monitoring

Cyber Watch. Written by Peter Buxbaum

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

A New Approach to Assessing Advanced Threat Solutions

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

Symantec Cyber Security Services: DeepSight Intelligence

The Comprehensive National Cybersecurity Initiative

Protecting against cyber threats and security breaches

Carbon Black and Palo Alto Networks

( 4EC C11392)

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks

Security and Privacy

Priority III: A National Cyberspace Security Awareness and Training Program

Stop advanced targeted attacks, identify high risk users and control Insider Threats

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

KEY TRENDS AND DRIVERS OF SECURITY

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Persistence Mechanisms as Indicators of Compromise

Chairman Johnson, Ranking Member Carper, and Members of the committee:

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Building a Business Case:

Incident Response. Six Best Practices for Managing Cyber Breaches.

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Protect Your Business and Customers from Online Fraud

Critical Security Controls

2010 Data Breach Investigations Report

Defending Against Data Beaches: Internal Controls for Cybersecurity

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

Cybercrimes: A Multidisciplinary Analysis

Security Intelligence Services.

Transcription:

TRANSATLANTIC CYBER SECURITY SUMMIT November 27-28, 2012 Dublin, Ireland

TRANSATLANTIC CYBER SECURITY SUMMIT Tuesday, November 27th Wednesday, November 28th INTRODUCTION: Mr. Tom McDermott OPENING KEYNOTE: Dr. Robert J. Elder OPENING KEYNOTE: Mr. John Grimes KEYNOTE ADDRESS: Mr. Alex Vandurme LUNCH SESSION 1: Thwarting Cyber Crime DEEP DIVE 1: Incident Response From Detection to Eradication CLOSING KEYNOTE ADDRESS: Lord John Reid SESSION 2: International Collaboration and Information Sharing DEEP DIVE 2: Malicious Software Analysis and Threat Intelligence Sharing LUNCH KEYNOTE ADDRESS: Mr. Joe Weiss SESSION 3: Building the Cyber Workforce CLOSING KEYNOTE ADDRESS: Dr. Jack Callahan

Tuesday, November 27th 0900 Registration: Coffee & Tea 1000 Introduction: Mr. Tom McDermott, Director of Research, Georgia Tech Research Institute 1030 Opening Keynote: Mr. John Grimes, Former Assistant Secretary of Defense for Networks and Information Integration, Chief Information Officer, Department of Defense 1130 Keynote Address: Mr. Alex Vandurme, Chief Engineer, NATO Computer Incident Response Capability (NCIRC) NCIRC Overview: The NCIRC is responsible for the cyber defense of all NATO sites, whether they are those of static HQs or HQs deployed for operations or exercises. It also offers cyber defense assistance to its member nations. Discover how NATO guards its networks against cyber-attacks, detect them, and once they have happened - react swiftly to limit the damage. Insight into the Alliance s nerve center in the fight against cyber-crime Overview of NATO s Rapid Reaction Team concept for assisting member states which ask for help in the event of an attack of national significance Learn about NCIRC s Malware Information Sharing Platform (MISP) 1215 Networking Lunch (provided) 1315 SESSION 1: Thwarting Cyber Crime Discover the key priorities and challenges that business, government, law enforcement and security agencies face in thwarting cyber crime such as: balancing the openness of the Internet with cyber crime prevention policies, solutions to transborder access to data, and forensic capability requirements to support investigations in countering cyber crime.

Tuesday, November 27th Session Chairs: Mr. Pavel Gladyshev, University College Dublin Forensics Mr. Joep Gommers, isight Dr. Maura Conway, Dublin City University Mr. Jaap Oss, Europol, European Cybercrime Centre, The Hague Prof. Sakir Sezer, Centre for Secure Information Technologies, Queen s University Belfast 1430 Coffee & Tea Networking Break 1445 DEEP DIVE 1: Incident Response From Detection to Eradication Dr. Fred Wright, Georgia Tech Research Institute Threats to network operations are continuing to evolve, incorporating zero-day exploits and covert communication channels. Threat actors are maintaining a constant presence on target networks, sometimes going dark for months before acting on objectives. In the face of such challenges, organizations need to evolve their network monitoring and incident response efforts to gain greater visibility and flexibility. This deep dive will focus on areas organizations can focus on to give their incident response teams a chance against the growing threat. Methodology: Why tracking all facets of an attack is important, and how it helps protect organizations from zero-day attacks Indicators of Compromise: A brief introduction to threat indicators Threat Intelligence: What data is out there to protect your environment? Monitoring Infrastructure: What data is necessary to detect and contain an intrusion? What is feasible to collect and visualize, and how can this data be operationalized effectively? 1545 Closing Keynote Address: Lord John Reid, former Home Secretary and Principal in the Chertoff Group 1630 Adjourn

Wednesday, November 28th 0830 Networking Breakfast (provided) 0900 Opening Keynote: Dr. Robert J. Elder, USAF Lt General (Ret.), Research Professor, George Mason University Alternative Approaches to Leverage Cyberspace for National Security 1000 SESSION 2: International Collaboration and Information Sharing This session discusses the key international challenges affecting cooperation and coordination of cyber policy and solutions. Understand how fostering strong public-private partnerships are a critical element in combatting the continually evolving threat posed by cyber attacks and the role industry and academia can play in creating strong international partnerships. Understand the difficulties in exchanging business and government cyber intelligence and how the outmoded bureaucratic barriers that slow us down can be removed. Session Chair: Mr. Jeff Evans, Georgia Tech Research Institute Mr. Ben Canino, United States Department of Homeland Security Mr. Brian Honan, Irish Reporting and Information Security Service, CERT Mr. Etienne DeBurgh, Financial Services Information Sharing and Analysis Center Mr. Philip Mills, Centre for Secure Information Technologies, Queen s University Belfast Mr. Slawomir Grzonkowski, Digital Enterprise Research Institute, National University of Ireland Galway 1115 Coffee & Tea Networking Break

Wednesday, November 28th 1130 DEEP DIVE 2: Malicious Software Analysis and Threat Intelligence Sharing Mr. Andrew Howard, Georgia Tech Research Institute Malicious code is one of the most common tools in breaching computer networks, despite continued efforts to improve detection and removal. State-sponsored malware has become increasingly difficult to prevent and mitigate due to the use of advanced data-stealing capabilities. Benefit from the opportunity to get the latest innovations on malware forensics and anti-malware techniques. Learn about an approach for community-driven threat intelligence to ensure that actionable intelligence disseminates quickly among organizations, ensuring rapid reaction to increasingly agile threats. This Deep Dive Will: Describe methods for designing and implementing automated malware analysis systems Discuss reasons why building an automated environment is beneficial to any organization s incident response capability Enhance your understanding of technical solutions to anonymous sharing of community-driven threat intelligence 1230 Networking Lunch (provided) 1330 Keynote Address: Mr. Joe Weiss, Applied Control Solutions, LLC Building the Industrial Control Systems Cyber Security Workforce: The average life of an ICS system is typically about 8-15 years (INL, 2004) but we all know that individual devices can be out there a great lot longer, and that the chain is as strong as its weakest link The reality is that most control systems engineers and operations teams have to make do with their legacy workstations and OSs, communications networks and field devices. In this unique session, you will learn about cybersecurity risks that affect our world s infrastructure and perhaps the weakest link in the chain the lacking ICS cyber security workforce.

Wednesday, November 28th 1430 SESSION 3: Building the Cyber Workforce Despite new approaches to network design and the latest in automated tools for detecting threats and defending networks, cyber security professionals are outflanked, outgunned, and often outwitted by very sophisticated and unknown enemies. This session discusses what must be done to expand and better prepare a more technically diverse cyber workforce and how leveraging industry, international partnerships, and especially academia is crucial to meeting the challenges of advanced persistent threats. Session Chair: Dr. Robert J. Elder, USAF Lt General (Ret.), Research Professor, George Mason University Mr. Joe Weiss, Applied Control Systems Dr. James Breckenridge, Mercyhurst University Lt Col (S) Bryant Springer, US Army, Chief Intel Systems, USAFRICOM Mr. Colm Fagan, Espion Mr. Tahar Kechadi, University College Dublin Forensics 1545 Closing Keynote: Dr. Jack Callahan, Office of Naval Research Global 1630 Adjourn

DUBLIN 2012 TRANSATLANTIC CYBER SECURITY SUMMIT November 27-28, 2012 Dublin, Ireland